文本文件  |  1338行  |  32.24 KB

# This file contains suppressions for the Dr.Memory tool, see
# http://dev.chromium.org/developers/how-tos/using-drmemory
#
# This file should contain suppressions only for the reports happening
# in the 'full' mode (drmemory_full).
# For the reports that can happen in the light mode (a.k.a. drmemory_light),
# please use suppressions.txt instead.

###############################################################
# Known reports on the third party we have no control over.
UNINITIALIZED READ
name=deflate UNINIT
...
*!deflate_*
*!MOZ_Z_deflate

# TODO(timurrrr): check if these frames change when NT_SYMBOLS are present.
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=406
ADVAPI32.dll!WmiOpenBlock
ADVAPI32.dll!WmiOpenBlock

# Leaks inside GoogleDesktop - it injects into our processes for some reason
LEAK
name=GoogleDesktop LEAK
...
GoogleDesktopNetwork3.DLL!DllUnregisterServer

# They deliberately use uninit local var in sqlite random generator
# random byte may mess up the call stack between randomByte and
# sqlite3_randomness
UNINITIALIZED READ
name=sqlite3_randomness UNINIT
*!randomByte
...
*!sqlite3_randomness

# Intentional leak in WebKit Template Framework for ThreadData.
LEAK
name=intentional WTF ThreadData leak
...
*!WTF::wtfThreadData

# Happens when winhttp returns ERROR_WINHTTP_UNABLE_TO_DOWNLOAD_SCRIPT.
LEAK
name=http://crbug.com/125558 a
KERNELBASE.dll!LocalAlloc
SECHOST.dll!...
SECHOST.dll!NotifyServiceStatusChange
WINHTTP.dll!...
WINHTTP.dll!WinHttpDetectAutoProxyConfigUrl
*!net::ProxyResolverWinHttp::GetProxyForURL

# Tiny locale-related leaks in ntdll.  Probably system bug.
LEAK
name=http://crbug.com/125558 b
ntdll.dll!...
ntdll.dll!*
KERNELBASE.dll!...
KERNELBASE.dll!GetCPInfoExW
webio.dll!*
webio.dll!*
webio.dll!*
WINHTTP.dll!...
WINHTTP.dll!WinHttpGetIEProxyConfigForCurrentUser
*!net::ProxyConfigServiceWin::GetCurrentProxyConfig

UNINITIALIZED READ
name=http://crbug.com/30704 #f
libpng.dll!wk_png_write_find_filter
libpng.dll!wk_png_write_row

###############################################################
# Suppress some false reports due to bugs in Dr.Memory like wrong analysis
# assumptions or unhandled syscalls

# Please note: the following suppressions were written in the abscense of
# private symbols so may need to be updated when we switch to auto-loading PDBs
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=12 (1)
ntdll.dll!Rtl*
ntdll.dll!Rtl*
ntdll.dll!RtlFindActivationContextSectionString

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=12 (2)
...
SHELL32.dll!SHFileOperation*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=12 (3)
...
SHELL32.dll!SHGetFolderPath*

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=12 (4)
...
SHELL32.dll!SHGetFolderPath*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=12 (5)
...
SHELL32.dll!SHCreateDirectory*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=12 (6)
...
SHELL32.dll!ILLoadFromStream*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=12 (7)
...
SHELL32.dll!ILSaveToStream*

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=12 (8)
...
SHELL32.dll!SHFileOperation*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=12 (9)
...
SHELL32.dll!SHGetItemFromDataObject

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=12 (10)
...
SHELL32.dll!SHGetItemFromDataObject

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=12 (11)
...
ole32.dll!*
SHELL32.dll!SHChangeNotifySuspendResume

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=14 (1)
...
*!CreateProcess*

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=14 (2)
...
*!CreateProcess*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=14 (3)
...
*!base::LaunchApp*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=17 (1)
...
*!CreateWindow*

POSSIBLE LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=17 (2)
GDI32.dll!*
GDI32.dll!CreateFontIndirectExW
GDI32.dll!CreateFontIndirectW

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=17 (3)
KERNELBASE.dll!LocalAlloc
...
USER32.dll!CreateWindow*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=18 a
...
*!CoInitialize*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=18 b
...
*!CoCreateInstance*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=18 c
...
*!CoUninitialize*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=18 d
...
UxTheme.dll!*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=40 a
...
WINSPOOL.DRV!*

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=40 b
...
WINSPOOL.DRV!*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=48 a
system call NtContinue
...
*!*SetThreadName

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=48 b
system call NtContinue
*!WTF::initializeCurrentThreadInternal

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=52 a
...
DBGHELP.dll!SymInitialize

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=52 b
...
DBGHELP.dll!SymEnumSourceFiles

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=52 c
...
msvcrt.dll!_RTDynamicCast

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=52 bit-level fp in dbghelp
instruction=test   0x*(%*) $0x??
DBGHELP.dll!SymUnloadModule64

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=53
ADVAPI32.dll!WmiMofEnumerateResourcesA
ADVAPI32.dll!WmiMofEnumerateResourcesA
ADVAPI32.dll!Sta*TraceW

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=58
...
*!_cfltcvt_l

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=60
USP10.dll!*
...
USP10.dll!ScriptStringAnalyse

LEAK
IMM32.dll!ImmGetIMCCSize
IMM32.dll!ImmLockClientImc
IMM32.dll!ImmDisableIME
IMM32.dll!ImmSetActiveContext
USER32.dll!IMPSetIMEA

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=65 a
...
*!SystemFunction036

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=65 b
...
*!talk_base::CreateRandomString

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=68 a
...
WS2_32.dll!*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=68 b
...
ADVAPI32.dll!SetSecurityDescriptorDacl

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=68 c
...
MSWSOCK.dll!WSPStartup

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=68 d
...
ntdll.dll!RtlValidateUnicodeString

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=256
*!_mtinit
*!__tmainCRTStartup
*!mainCRTStartup

POSSIBLE LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=274 a
...
GDI32.dll!CreateDCW

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=274 b
...
GDI32.dll!CreateDCW

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=275
...
*!_getptd*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=276
...
ntdll.dll!RtlConvertUlongToLargeInteger
ntdll.dll!RtlConvertUlongToLargeInteger
ntdll.dll!KiUserExceptionDispatcher

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=305
*!free
*!free
*!operator new
...
*!MiniDumpWriteDump

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=346 a
...
GDI32.dll!CloseEnhMetaFile

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=346 b
GDI32.dll!SetPolyFillMode
GDI32.dll!CreateICW

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=362
USER32.dll!UnregisterClass*

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=382
...
ntdll.dll!CsrNewThread

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=397
system call NtDeviceIoControlFile InputBuffer
ADVAPI32.dll!ImpersonateAnonymousToken

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=407 a
system call NtRequestWaitReplyPort
RPCRT4.dll!I_RpcSendReceive
RPCRT4.dll!NdrSendReceive

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=407 b
IMM32.dll!*
ntdll.dll!LdrInitializeThunk
ntdll.dll!LdrShutdownThread

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=412 a
ADVAPI32.dll!RegDeleteValue*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=412 b
...
ADVAPI32.dll!Crypt*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=412 c
...
RPCRT4.dll!NdrClientCall2

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=412 d
RSAENH.dll!DllUnregisterServer
...
ADVAPI32.dll!CryptAcquireContextA
CRYPT32.dll!CryptEnumOIDFunction
...
CRYPT32.dll!CertFindCertificateInStore

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=412 e
...
RSAENH.dll!CPGenRandom

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=412 f
...
CRYPT??.dll!Crypt*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=412 g
*!replace_memcmp
...
*!testing::internal::CmpHelperEQ*
...
*!SymmetricKeyTest_ImportGeneratedKey_Test::TestBody

# We get these sometimes from AesEncrypt and AesExpandKey.  AesEncrypt doesn't
# have frame pointers, and we have trouble unwinding from it.  Therefore, we use
# this broad suppression, effectively disabling uninit checks in rsaenh.dll.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=412 h
RSAENH.dll!*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=425 a
CLBCatQ.DLL!DestroyStgDatabase
CLBCatQ.DLL!PostError
CLBCatQ.DLL!PostError

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=425 b
RPCRT4.dll!I_RpcBCacheFree
RPCRT4.dll!I_RpcBCacheFree
...
RPCRT4.dll!NdrClientCall2

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=425 c
msdmo.dll!*
msdmo.dll!*
DEVENUM.DLL!*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=435 a
...
ntdll.dll!RtlSetSecurityObject
ntdll.dll!RtlNewSecurityObjectEx
ADVAPI32.dll!CreatePrivateObjectSecurityEx
NTMARTA.dll!AccRewriteSetNamedRights

POSSIBLE LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=435 b
WLDAP32.dll!Ordinal325
...
WLDAP32.dll!Ordinal325
ntdll.dll!LdrInitializeThunk
ntdll.dll!LdrFindResourceDirectory_U
ntdll.dll!RtlValidateUnicodeString
ntdll.dll!LdrLoadDll
KERNEL32.dll!LoadLibraryExW

# mod+offs suppression because the symbolic makes no sense and changes
# completely in the presence of WS2_32.dll symbols.
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=438
<WS2_32.dll+0x260c>
<WS2_32.dll+0x2b76>
<WS2_32.dll+0x2c61>

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=454 a
...
WINMM.dll!wave*GetNumDevs

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=454 b
...
WINMM.dll!wave*GetNumDevs

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=466
ntdll.dll!RtlRunOnceBeginInitialize
ntdll.dll!RtlInitializeCriticalSectionAndSpinCount

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=471 a
*!media::AudioRendererAlgorithmOLA::Crossfade<unsigned char>
*!media::AudioRendererAlgorithmOLA::FillBuffer
*!media::AudioRendererAlgorithmOLATest_FillBuffer_*

# Uninit reported in copy ctor.  Would be nice if we could specify which ctor
# overload to suppress.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=471 b
*!WebCore::FormDataElement::FormDataElement

# Another default copy ctor uninit.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=471 c
*!WebCore::CachedResourceLoader::InitiatorInfo::InitiatorInfo
...
*!WTF::Hash*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=473 a
system call NtDeviceIoControlFile InputBuffer
...
iphlpapi.dll!GetAdaptersAddresses

POSSIBLE LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=473 b
ESENT.dll!*
ESENT.dll!*
ESENT.dll!*
ntdll.dll!Ldr*Init*
ntdll.dll!Ldr*
ntdll.dll!*
ntdll.dll!LdrLoadDll
...
iphlpapi.dll!GetPerAdapterInfo
...
iphlpapi.dll!GetAdaptersAddresses

POSSIBLE LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=473 c
RPCRT4.dll!*
RPCRT4.dll!*
...
IPHLPAPI.DLL!GetAdaptersAddresses

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=475
...
ADVAPI32.dll!CryptAcquireContextA
...
CRYPT32.dll!CryptMsgOpenToDecode
...
CRYPT32.dll!CryptQueryObject

# Lots of leaks from our interactions with the system certificate store.  May be
# worth reviewing our use of their API.
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 a
KERNEL*.dll!LocalAlloc
...
CRYPT32.dll!CertGetCRLContextProperty

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 b
KERNEL*.dll!LocalAlloc
...
CRYPT32.dll!CertAddCRLContextToStore

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 c
KERNEL*.dll!LocalAlloc
...
CRYPT32.dll!CertOpenStore

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 d
...
CRYPT32.dll!CertOpenSystemStore?

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 e
...
CRYPT32.dll!CertGetCertificateChain

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 f
...
CRYPT32.dll!CertCompareIntegerBlob

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 g
...
CRYPT32.dll!CryptUnprotectData

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 h
KERNEL*.dll!LocalAlloc
...
CRYPT32.dll!CertEnumCertificatesInStore

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 i
...
CRYPT32.dll!CryptProtectData

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=476 j
...
CRYPT32.dll!CryptExportPublicKeyInfoEx

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=502 a
system call NtSecureConnectPort parameter #3
GDI32.dll!*
GDI32.dll!*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=502 b
system call NtGdiEnumFonts parameter #6
GDI32.dll!*
GDI32.dll!*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=511 a
RPCRT4.dll!...
ole32.dll!*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=511 b
ole32.dll!*
ole32.dll!*
ole32.dll!StringFromGUID2

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=512 a
...
*!browser_sync::Cryptographer::PackBootstrapToken
*!browser_sync::Cryptographer::GetBootstrapToken

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=512 b
...
*!Encrypt*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=513 a
*!v8*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=513 b
*!*
*!v8*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=513 c
<not in a module>
...
*!v8*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=546
...
mscms.dll!*
...
GDI32.dll!*
*!IconUtil::Create*HICON*

LEAK
name=http://crbug.com/92152
...
USER32.dll!CreateWindowExW
*!views::TooltipManagerWin::Init
*!views::TooltipManagerWin::TooltipManagerWin

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=567 a
dbghelp.dll!*
...
dbghelp.dll!StackWalk64

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=567 b
*!*
dbghelp.dll!*
...
dbghelp.dll!StackWalk64

# Symbols w/o PDB make no sense, first ntdll frame is TpSetTimer w/o syms and
# TppWorkerThread w/ syms.  We used to use mod+offs here, but that was too
# brittle, so we switched to RPCRT4.dll!*.
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=569
RPCRT4.dll!...
ntdll.dll!*
ntdll.dll!*
KERNEL*.dll!BaseThreadInitThunk

# TODO(timurrrr): investigate these
UNINITIALIZED READ
name=http://crbug.com/TODO a
...
*!win_util::GetLogonSessionOnlyDACL

UNINITIALIZED READ
name=http://crbug.com/TODO b
...
ntshrui.dll!IsPathSharedW

UNINITIALIZED READ
name=http://crbug.com/TODO c
...
*!NetApiBufferFree

UNINITIALIZED READ
name=http://crbug.com/TODO d
...
*!ShellExecute*

UNINITIALIZED READ
name=http://crbug.com/TODO e
...
*!SHParseDisplayName

UNINITIALIZED READ
name=http://crbug.com/TODO f
...
*!GetCanonicalPathInfo*

UNINITIALIZED READ
name=http://crbug.com/TODO g
...
SHELL32.dll!Ordinal*

UNINITIALIZED READ
name=http://crbug.com/TODO h
...
GDI32.dll!GetTextExtentPoint32*

UNINITIALIZED READ
name=http://crbug.com/TODO i
...
*!SyncSocketClientListener::OnMsgClassResponse

UNINITIALIZED READ
name=http://crbug.com/TODO j
...
*!*NSPRInitSingleton*

UNINITIALIZED READ
name=http://crbug.com/TODO k
*!NdrSimpleStructFree

UNINITIALIZED READ
name=http://crbug.com/TODO l
ntdll.dll!RtlpNtOpenKey
ntdll.dll!RtlMakeSelfRelativeSD
ntdll.dll!RtlAbsoluteToSelfRelativeSD
ADVAPI32.dll!MakeSelfRelativeSD

UNINITIALIZED READ
name=http://crbug.com/TODO m
...
CRYPT32.dll!I_CertSyncStore

# This matches the same stack as DrMem i#751, but it's an uninit read instead of
# a leak.  Must be some early thread initialization.  Doesn't look like
# bit-level though.
UNINITIALIZED READ
name=http://crbug.com/TODO n
RPCRT4.dll!*
RPCRT4.dll!*
RPCRT4.dll!*
ntdll.dll!*
ntdll.dll!*
KERNEL*.dll!BaseThreadInitThunk

# No idea where this is from, but Chrome isn't even on the stack.
POSSIBLE LEAK
name=http://crbug.com/TODO o
RPCRT4.dll!...
ole32.dll!OleInitialize
ole32.dll!...
KERNEL32.dll!BaseThreadInitThunk

# Matches lots of RPC related leaks.  So far RPC handles have been mostly owned
# by system libraries and are not something we can fix easily.
POSSIBLE LEAK
name=http://crbug.com/TODO p
RPCRT4.dll!*
RPCRT4.dll!*
RPCRT4.dll!NDRCContextBinding

# No idea, but all system code, not interesting.
POSSIBLE LEAK
name=http://crbug.com/TODO q
RPCRT4.dll!...
RPCRT4.dll!*
RPCRT4.dll!*
ole32.dll!...
ole32.dll!*
ole32.dll!*
...
SHELL32.dll!*

LEAK
name=http://crbug.com/109278 video device COM leaks
...
*!media::VideoCaptureDevice::*

LEAK
name=http://crbug.com/109278 audio device COM leaks
...
*!media::GetInputDeviceNamesWin

# False pos uninit in shell32 when resolving links.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=745
SHELL*.dll!*
...
SHELL*.dll!*
*!file_util::ResolveShortcut

# Probable false pos uninit in ffmpeg.  Probably due to running off the end of a
# buffer with SSE/MMX instructions whose results are then masked out later.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=747 a
*!ff_pred4x4_vertical_vp8_mmxext

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=747 b
*!ff_pred4x4_down_left_mmxext

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=747 c
*!ff_vorbis_floor1_render_list

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=747 d
*!ff_put_vp8_epel8_h6_ssse3

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=747 e
*!ff_put_vp8_epel8_h4_ssse3

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=747 f
*!ff_fft_permute_sse

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=747 g
*!ff_simple_idct_add_mmx

# ffmpeg seems to leak a pthread condition variable.
LEAK
name=http://crbug.com/110042
*!ptw32_new
*!pthread_self
*!sem_wait
*!pthread_cond_wait
*!ff_thread_decode_frame
*!avcodec_decode_video2

# Improperly handled ioctl in bcrypt.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=748
system call NtDeviceIoControlFile InputBuffer
bcrypt.dll!BCryptUnregisterConfigChangeNotify
bcrypt.dll!BCryptGetFipsAlgorithmMode
ntdll.dll!RtlQueryEnvironmentVariable

# Not sure what this is.
POSSIBLE LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=749
...
fwpuclnt.dll!*
...
RPCRT4.dll!*
...
fwpuclnt.dll!*
...
WS2_32.dll!*
*!talk_base::SafeGetHostByName
*!talk_base::SocketAddress::GetLocalIPs
*!talk_base::SocketAddress::IsLocalIP
*!cricket::Transport::VerifyCandidate
*!cricket::Session::OnRemoteCandidates
*!cricket::Session::OnTransportInfoMessage
*!cricket::Session::OnIncomingMessage
*!cricket::SessionManager::OnIncomingMessage

# More uninit false pos in rpcrt4.dll not caught by default suppressions.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=529
RPCRT4.dll!*
...
*!base::LaunchProcess

# System leak from CreateEnvironmentBlock.
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=757
...
USERENV.dll!CreateEnvironmentBlock

# Looks like another instance of 753
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=753
...
ntdll.dll!RtlLoadString

# More bit manip fps
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=493
USP10.dll!ScriptPositionSingleGlyph

# Various TLS leaks that we don't understand yet.  We should be finding a root
# for these.
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=778 a
KERNELBASE.dll!TlsSetValue

# Originally filed as: http://crbug.com/109281
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=778 b
*!operator new
*!operator new[]
*!*::ConstructTlsVector
*!base::ThreadLocalStorage::StaticSlot::Get

# This is an NSS PRThread object installed in TLS.  Why isn't this detected as a
# root?  See also http://crbug.com/32624
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=778 c
*!PR_Calloc
*!_PR_AttachThread
*!_PRI_AttachThread

# Bit-level fps in rich edit layer.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=791
RICHED20.dll!*
RICHED20.dll!*

# Already suppressed by drmemory default supp we don't have yet.
LEAK
name=i#757: RPC binding leaks in sspicli.dll
RPCRT4.dll!*
...
SspiCli.dll!*
SspiCli.dll!Cre*

# Async NtReadFile false positives.  This was fixed in drmemory r772, remove
# this supp when we pull that rev.
UNADDRESSABLE ACCESS
name=http://code.google.com/p/drmemory/issues/detail?id=798
system call NtReadFile parameter #5
KERNEL32.dll!ReadFile

# Probable syscall false positive.
UNADDRESSABLE ACCESS
name=http://code.google.com/p/drmemory/issues/detail?id=809
system call NtGdiPolyPolyDraw parameter #1
*!gfx::Path::CreateNativeRegion

# Very wide suppression for all uninits in rpcrt4.dll.  We get bad stack traces
# coming out of this module (sometimes only one frame), which makes it hard to
# write precise suppressions.  Until we have bit-level tracking (DRMi#113) we
# should keep this.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=113 rpcrt4.dll wildcard
RPCRT4.dll!*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=841 a
...
CRYPTNET.dll!I_CryptNetGetConnectivity

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=841 b
...
webio.dll!*

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=841 c
...
winhttp.dll!*

LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=841 d
...
CRYPTNET.dll!I_CryptNetGetConnectivity

# Often missing a ntdll.dll!KiUserCallbackDispatcher frame.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=810
instruction=test   %edx %edx
USER32.dll!GetClassLongW
...
*!ui::CenterAndSizeWindow

UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=815
KERNEL*.dll!...
dxgi.dll!*
USER32.dll!GetMonitorInfoA
ntdll.dll!KiUserCallbackDispatcher
dxgi.dll!*
WinSATAPI.DLL!*

# Suppress anything in cmd.exe.  It's safer to suppress these than disable
# following, since someone might launch a Chrome process via cmd.exe.
LEAK
name=cmd.exe
...
cmd.exe!*

# Possible true system use after free.
UNADDRESSABLE ACCESS
name=http://code.google.com/p/drmemory/issues/detail?id=623
KERNELBASE.dll!TlsGetValue
OLEAUT32.dll!SysFreeString
OLEAUT32.dll!SysAllocStringByteLen
OLEACC.dll!*
OLEACC.dll!*
OLEACC.dll!*
OLEACC.dll!*

# basic_streambuf seems to leak something in creating a std::_Mutex
LEAK
name=http://code.google.com/p/drmemory/issues/detail?id=857
ntdll.dll!...
ntdll.dll!RtlInitializeCriticalSection
*!_Mtxinit
*!std::_Mutex::_Mutex
*!std::basic_streambuf<*>

# stdext::hash_map<> seems to swap uninitialized floats.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=931
*!std::swap<float>
*!std::_Hash<*

# syscall false positive on handling NtQuerySystemInformation, fix in soon.
UNINITIALIZED READ
name=http://code.google.com/p/drmemory/issues/detail?id=932
KERNEL32.dll!K32GetPerformanceInfo

# Seems to create a DC, sometimes.  GetTextMetrics returns no pointers, though.
LEAK
name=GDI SetBrushOrgEx leak
GDI32.dll!...
GDI32.dll!GetTextMetricsW
*!gfx::PlatformFontWin::CreateHFontRef
*!gfx::PlatformFontWin::GetBaseFontRef

###############################################################
# Benign issues in Chromium

# This test intentionally leaks an object and checks that it's never deleted.
LEAK
name=BrowserThreadTest.NotReleasedIfTargetThreadNonExistant leak
...
*!BrowserThreadTest_NotReleasedIfTargetThreadNonExistent_Test::TestBody

LEAK
name=deliberate histogram leak
...
*!replace_operator_new
...
*!*::*Histogram::FactoryGet

LEAK
name=deliberate leak for SampleMap
...
*!base::SampleMap::Accumulate
*!base::SparseHistogram::Add

LEAK
name=deliberate LazyInstance leak
...
*!*LeakyLazyInstance*
...
*!base::LazyInstance*::Pointer

LEAK
name=http://crbug.com/79933 (1)
...
*!TestURLRequestContext::Init

LEAK
name=http://crbug.com/79933 (2)
...
*!TestURLRequestContext::TestURLRequestContext
*!TestURLRequestContextGetter::GetURLRequestContext
*!notifier::SingleLoginAttempt::SingleLoginAttempt
*!notifier::Login::StartConnection
*!syncer::InvalidationNotifier::UpdateCredentials
*!syncer::NonBlockingInvalidationNotifier::Core::UpdateCredentials

LEAK
name=http://crbug.com/79933 (3)
...
*!TestURLRequestContext::TestURLRequestContext
*!TestURLRequestContextGetter::GetURLRequestContext
*!URLFetcher::Core::StartURLRequest

LEAK
name=http://crbug.com/79933 (4)
*!generic_cpp_alloc
*!operator new
*!std::_Allocate<net::SSLConfigService::Observer *>
*!std::allocator<net::SSLConfigService::Observer *>::allocate
*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::_Insert_n
*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::insert
*!std::vector<net::SSLConfigService::Observer *,std::allocator<net::SSLConfigService::Observer *> >::push_back
*!ObserverListBase<net::SSLConfigService::Observer>::AddObserver
...
*!net::HttpNetworkSession::HttpNetworkSession
*!notifier::ProxyResolvingClientSocket::ProxyResolvingClientSocket
*!notifier::XmppClientSocketFactory::CreateTransportClientSocket
*!notifier::ChromeAsyncSocket::Connect
*!buzz::XmppClient::ProcessStartXmppLogin
*!buzz::XmppClient::Process
*!talk_base::Task::Step
*!talk_base::TaskRunner::InternalRunTasks
*!talk_base::TaskRunner::RunTasks
*!notifier::TaskPump::CheckAndRunTasks
*!base::internal::RunnableAdapter<void (__thiscall notifier::TaskPump::*)(void)>::Run

# Test intentionally leaks an object.
LEAK
name=http://crbug.com/86301
*!replace_operator_new
...
*!*_DeadReplyLoopDoesNotDelete_Test::TestBody

# Leak in a binary copy of Firefox 3's NSS dll.  Not much we can do about it.
LEAK
name=Firefox 3 NSS dll leak
nspr4.dll!*
...
*!NSSDecryptor::~NSSDecryptor

# We get uninit reports inside GMock when it prints the bytes of references to
# partially initialized objects passed to unexpected method calls.
UNINITIALIZED READ
name=GMock printing uninit data
...
*!testing::internal2::PrintBytesInObjectTo

###############################################################
# Real issues in Chromium

LEAK
name=http://crbug.com/32085
...
chrome.dll!NotificationRegistrar::Add

LEAK
name=http://crbug.com/32623
...
*!ssl3_HandleHandshakeMessage
*!ssl3_HandleHandshake
*!ssl3_HandleRecord
*!ssl3_GatherCompleteHandshake
...
*!SSL_ForceHandshake
*!net::SSLServerSocketNSS::DoHandshake
*!net::SSLServerSocketNSS::DoHandshakeLoop

UNINITIALIZED READ
name=http://crbug.com/57266 (1)
...
*!remoting::EncoderVp8::Encode

UNINITIALIZED READ
name=http://crbug.com/57266 (2)
...
*!vp8_*

LEAK
name=http://crbug.com/70062
*!PR_Calloc
*!PR_NewLock
...
*!InitSessionCacheLocks
*!initSessionCacheLocksLazily
*!PR_CallOnce
*!ssl_InitSessionCacheLocks
*!lock_cache
*!ssl_LookupSID
*!ssl2_BeginClientHandshake
*!ssl_Do1stHandshake
*!SSL_ForceHandshake
*!net::SSL*SocketNSS::DoHandshake
*!net::SSL*SocketNSS::DoHandshakeLoop

LEAK
name=http://crbug.com/74417 a
*!replace_operator_new
*!disk_cache::BackendImpl::CreateEntryImpl

LEAK
name=http://crbug.com/74417 b
*!replace_operator_new
*!disk_cache::BackendImpl::NewEntry

# One more disk_cache::BackendImpl leak.  See also http://crbug.com/87500.
LEAK
name=http://crbug.com/74417 c
*!replace_operator_new
...
*!disk_cache::EntryImpl::UserBuffer::UserBuffer

LEAK
name=http://crbug.com/75247
...
*!replace_operator_new
*!AutofillDownloadTestHelper::AutofillDownloadTestHelper

LEAK
name=http://crbug.com/78784
*!generic_cpp_alloc
*!operator new
*!TestingProfile::CreateRequestContext
*!*ProfileSyncService*::SetUp

LEAK
name=http://crbug.com/80550 (1)
...
*!RenderWidgetHost::WasHidden

LEAK
name=http://crbug.com/80550 (2)
...
*!RenderWidgetHost::WasRestored

LEAK
name=http://crbug.com/87612
...
*!SSL_ConfigSecureServer
*!net::SSLServerSocketNSS::InitializeSSLOptions
*!net::SSLServerSocketNSS::Handshake

LEAK
name=http://crbug.com/88640
*!generic_cpp_alloc
*!operator new
*!ProfileImpl::InitRegisteredProtocolHandlers
*!ProfileImpl::DoFinalInit
*!ProfileImpl::OnPrefsLoaded

LEAK
name=http://crbug.com/91465
*!generic_cpp_alloc
*!operator new
*!browser_sync::internal::WeakHandleCore<browser_sync::JsBackend>::*
*!browser_sync::WeakHandle<browser_sync::JsBackend>::*
*!syncer::SyncManager::SyncInternal::Init

LEAK
name=http://crbug.com/91491
...
*!CrxUpdateService::ProcessPendingItems

UNINITIALIZED READ
name=http://crbug.com/92026 (1)
softokn3.dll!FC_GetFunctionList
...
softokn3.dll!NSC_ModuleDBFunc

UNINITIALIZED READ
name=http://crbug.com/92026 (2)
freebl3.dll!FREEBL_GetVector
...
softokn3.dll!NSC_ModuleDBFunc

LEAK
name=http://crbug.com/92166
...
*!replace_operator_new
*!views::NativeWidgetWin::OnCreate

# Possible real Chromium issue in DoCrossfade.
UNINITIALIZED READ
name=http://crbug.com/110049
*!media::DoCrossfade<*>
*!media::Crossfade
*!media::AudioRendererAlgorithmBase::FillBuffer

# Known sqlite3 leaks.
LEAK
name=http://crbug.com/113847 (1)
...
*!sqlite3MemMalloc
*!mallocWithAlarm
*!sqlite3Malloc
...
*!yy_reduce

LEAK
name=http://crbug.com/113847 (2)
...
*!openDatabase
*!sqlite3_open

LEAK
name=http://crbug.com/115328
...
*!GenericInfoViewTest_GenericInfoView_Test::TestBody

UNINITIALIZED READ
name=http://crbug.com/116277
*!MOZ_Z_deflate
*!zipCloseFileInZipRaw64

LEAK
name=http://crbug.com/117427 a
...
*!net::HostCache::Set
*!net::HostResolverImpl::CacheResult
*!net::HostResolverImpl::Job::CompleteRequests
*!net::HostResolverImpl::Job::OnProcTaskComplete
*!base::internal::RunnableAdapter<void (__thiscall net::HostResolverImpl::Job::*)(int,net::AddressList const &)>::Run

# Probably related to 117427.  Someone is not tearing down DNS resolution during
# testing.
LEAK
name=http://crbug.com/117427 b
*!generic_cpp_alloc
*!operator new
*!base::internal::WeakReferenceOwner::GetRef
*!base::SupportsWeakPtr<net::HostResolverImpl>::AsWeakPtr
*!net::HostResolverImpl::Job::Job
*!net::HostResolverImpl::Resolve
*!net::SingleRequestHostResolver::Resolve
*!net::TransportConnectJob::DoResolveHost
*!net::TransportConnectJob::DoLoop
*!net::TransportConnectJob::ConnectInternal
*!net::ConnectJob::Connect
*!net::internal::ClientSocketPoolBaseHelper::RequestSocketInternal
*!net::internal::ClientSocketPoolBaseHelper::RequestSocket
*!net::ClientSocketPoolBase<net::TransportSocketParams>::RequestSocket
*!net::TransportClientSocketPool::RequestSocket
*!net::ClientSocketHandle::Init<net::TransportSocketParams,net::TransportClientSocketPool>
*!net::`anonymous namespace'::InitSocketPoolHelper
*!net::InitSocketHandleForRawConnect
*!notifier::ProxyResolvingClientSocket::ProcessProxyResolveDone
*!base::internal::RunnableAdapter<void (__thiscall notifier::ProxyResolvingClientSocket::*)(int)>::Run

# IE frame possible leak of COM object.
LEAK
name=http://crbug.com/122399
ole32.dll!...
ole32.dll!CoTaskMemAlloc
urlmon.dll!...
urlmon.dll!CreateUri
IEFRAME.dll!*

# RenderWidgetHelper leak in DelayProfileDestruction test.
LEAK
name=http://crbug.com/125565
*!generic_cpp_alloc
*!operator new
*!RenderProcessHostImpl::RenderProcessHostImpl
*!SiteInstanceImpl::GetProcess
*!BrowserTestOffTheRecord_DelayProfileDestruction_Test::TestBody

LEAK
name=http://crbug.com/125807
*!generic_cpp_alloc
*!operator new
*!TransportSecurityPersister::TransportSecurityPersister
*!TransportSecurityPersisterTest::TransportSecurityPersisterTest